Skip to main content

Audio Secret Management Scheme Using Shamir’s Secret Sharing

  • Conference paper
MultiMedia Modeling (MMM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8935))

Included in the following conference series:

Abstract

Audio Secret Sharing (ASS) is a technique used to protect audio data from tampering and disclosure by dividing it into shares such that qualified shares can reconstruct the original audio data. Existing ASS schemes encrypt binary secret messages and rely on the human auditory system for decryption by simultaneously playing authorized shares. This decryption approach tends to overburden the human auditory system when the number of shares used to reconstruct the secret increases [3]. Furthermore, it does not create room for further analysis or computation to be performed on the reconstructed secret since decryption ends at the human auditory system. Additionally, schemes in [2], [3], [4], [6] do not extend to the general (k, n) threshold. In this paper we propose an ASS scheme based on Shamir’s secret sharing, which is (k, n) threshold, ideal2, and information theoretically secure and it provides computationally efficient decryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  2. Lin, C.C., Laih, C.S., Yang, C.N.: New Audio Secret Sharing Schemes With Time Division Technique. Journal of Information Science and Engineering 19, 605–614 (2003)

    MathSciNet  Google Scholar 

  3. Desmedt, Y.G., Hou, S., Quisquater, J.-J.: Audio and optical cryptography. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 392–404. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  4. Nishimura, R., Fujita, N., Suzuki, Y.: Audio Secret Sharing for 1-Bit Audio. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds.) KES 2005. LNCS (LNAI), vol. 3682, pp. 1152–1158. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Ehdaie, M., Eghlidos, T., Aref, M.R.: A novel secret sharing scheme from audio perspective. In: International Symposium on Telecommunications, pp. 13–18. IEEE, Tehran (2008)

    Google Scholar 

  6. Yoshida, K., Watanabe, Y.: Security of audio secret sharing scheme encrypting audio secrets. In: International Conference for Internet Technology and Secured Transactions, pp. 294–295. IEEE, London (2012)

    Google Scholar 

  7. Washio, S., Watanabe, Y.: Security of audio secret sharing scheme encrypting audio secrets with bounded shares. In: International Conference on Acoustics, Speech and Signal Processing (ICASSP 2014), pp. 7396–7400. IEEE, Italy (2014)

    Chapter  Google Scholar 

  8. Stallings, W.: Cryptography and Network Security Principles and Practice, 5th edn. Prentice-Hall (2010)

    Google Scholar 

  9. SVV media audio database, http://download.wavetlan.com/SVV/Media/HTTP/http-wav.htm

  10. Atrey Pradeep, K., Alharthi, S., Hossain, M.A., AlGhamdi, A., El-Saadik, A.: Collective control over sensitive video data using secret sharing. Multimedia Tools and Applications (2013), doi:10.1007/s11042-013-1644-0

    Google Scholar 

  11. Chan, K.F.P.: Secret Sharing in Audio Steganography. In: Information Security South Africa, ISSA. South Africa (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Yakubu, M.A., Maddage, N.C., Atrey, P.K. (2015). Audio Secret Management Scheme Using Shamir’s Secret Sharing. In: He, X., Luo, S., Tao, D., Xu, C., Yang, J., Hasan, M.A. (eds) MultiMedia Modeling. MMM 2015. Lecture Notes in Computer Science, vol 8935. Springer, Cham. https://doi.org/10.1007/978-3-319-14445-0_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14445-0_34

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14444-3

  • Online ISBN: 978-3-319-14445-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics